A strategy based on the concept of defense in depth is likely to include intrusion detection systems, active vulnerability scanners, passive vulnerability scanners, automated log analyzers, and protocol analyzers.
Answer the following statement true (T) or false (F)
True
Computer Science & Information Technology